{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:53:45Z","timestamp":1751608425131,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,18]],"date-time":"2018-06-18T00:00:00Z","timestamp":1529280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000133","name":"Agency for Healthcare Research and Quality","doi-asserted-by":"publisher","award":["HS022110-01A10"],"award-info":[{"award-number":["HS022110-01A10"]}],"id":[{"id":"10.13039\/100000133","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,18]]},"DOI":"10.1145\/3209626.3209702","type":"proceedings-article","created":{"date-parts":[[2018,6,13]],"date-time":"2018-06-13T18:21:21Z","timestamp":1528914081000},"page":"11-17","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Patient Preferences for Authentication and Security"],"prefix":"10.1145","author":[{"given":"Ann","family":"Fruhling","sequence":"first","affiliation":[{"name":"University of Nebraska Omaha, Omaha, NE, USA"}]},{"given":"Devika","family":"Ramachandran","sequence":"additional","affiliation":[{"name":"University of Nebraska Omaha, Omaha, NE, USA"}]},{"given":"Tamara","family":"Bernard","sequence":"additional","affiliation":[{"name":"University of Nebraska Medical Center, Omaha, NE, USA"}]},{"given":"Ryan","family":"Schuetzler","sequence":"additional","affiliation":[{"name":"University of Nebraska Omaha, Omaha, NE, USA"}]},{"given":"John","family":"Windle","sequence":"additional","affiliation":[{"name":"University of Nebraska Medical Center, Omaha, NE, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,6,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Administration on Aging. A profile of older Americans. 2002.  Administration on Aging. A profile of older Americans. 2002."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Agresti A. 2002. Categorical Data Analysis. Hoboken NJ: Wiley.  Agresti A. 2002. Categorical Data Analysis. Hoboken NJ: Wiley.","DOI":"10.1002\/0471249688"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Allaert FA Le Teuff G Quantin C Barber B. 2004. The legal acknowledgement of the electronic signature: a key for a secure direct access of patients to their computerised medical record. International Journal of Medical Informatics;73(3):239--42.  Allaert FA Le Teuff G Quantin C Barber B. 2004. The legal acknowledgement of the electronic signature: a key for a secure direct access of patients to their computerised medical record. International Journal of Medical Informatics;73(3):239--42.","DOI":"10.1016\/j.ijmedinf.2003.11.007"},{"key":"e_1_3_2_1_4_1","unstructured":"American Heart Association Statistics Committee and Stroke Statistics Subcommittee. Heart disease and stroke statistics 2017 at-a-glance.  American Heart Association Statistics Committee and Stroke Statistics Subcommittee. Heart disease and stroke statistics 2017 at-a-glance."},{"key":"e_1_3_2_1_5_1","unstructured":"Android unlock pattern security analysis. 2012. {updated May 21}. Available from: https:\/\/sinustrom.info\/2012\/05\/21\/android-unlock-pattern-security-analysis\/. Archived at: http:\/\/www.webcitation.org\/6uerL1mOR.  Android unlock pattern security analysis. 2012. {updated May 21}. Available from: https:\/\/sinustrom.info\/2012\/05\/21\/android-unlock-pattern-security-analysis\/. Archived at: http:\/\/www.webcitation.org\/6uerL1mOR."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1035575.1035578"},{"key":"e_1_3_2_1_7_1","unstructured":"Berry N. 2012. PIN Analysis. Available from: http:\/\/www.datagenetics.com\/blog\/september32012\/  Berry N. 2012. PIN Analysis. Available from: http:\/\/www.datagenetics.com\/blog\/september32012\/"},{"key":"e_1_3_2_1_8_1","unstructured":"Blackwell DL Villarroael MA. 2015. Summary Health Statistics: National Health Interview Survey 2015.  Blackwell DL Villarroael MA. 2015. Summary Health Statistics: National Health Interview Survey 2015."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.49"},{"key":"e_1_3_2_1_10_1","unstructured":"Brooke J. SUS-A quick and dirty usability scale. In: Jordan PW Thomas B Weerdmeester BA McClelland IL editors. Usability Evaluation in Industry. London: Taylor & Francis Ltd; 1996. pp. 189--194.  Brooke J. SUS-A quick and dirty usability scale. In: Jordan PW Thomas B Weerdmeester BA McClelland IL editors. Usability Evaluation in Industry. London: Taylor & Francis Ltd; 1996. pp. 189--94."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101779.1101784"},{"key":"e_1_3_2_1_12_1","first-page":"679","volume":"2014","author":"Chrischilles EA","journal-title":"Journal of the American Medical Informatics Association."},{"key":"e_1_3_2_1_13_1","unstructured":"Clarke MA Sitorius M Windle T Fruhling AL Bernard TL Windle JR. 2016A qualitative study of user-desired personal health record functionality: impact of age on desired PHR functionality. Abstract presented at the 40th American Medical Informatics Association (AMIA) Annual Symposium Nov 2016 Chicago IL.  Clarke MA Sitorius M Windle T Fruhling AL Bernard TL Windle JR. 2016A qualitative study of user-desired personal health record functionality: impact of age on desired PHR functionality. Abstract presented at the 40th American Medical Informatics Association (AMIA) Annual Symposium Nov 2016 Chicago IL."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(00)06027-2"},{"key":"e_1_3_2_1_15_1","first-page":"178","volume":"200","author":"Furnell SM","journal-title":"Computer Security."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1253564"},{"key":"e_1_3_2_1_17_1","unstructured":"Health Information Technology for Economic and Clinical Health Act. 2009. HHS.gov  Health Information Technology for Economic and Clinical Health Act. 2009. HHS.gov"},{"key":"e_1_3_2_1_18_1","unstructured":"Health Insurance Portability and Accountability Act of 1996 (Aug 21 1996). HHS.gov  Health Insurance Portability and Accountability Act of 1996 (Aug 21 1996). HHS.gov"},{"key":"e_1_3_2_1_19_1","unstructured":"How to attain meaningful use. {Internet}.; 2013. Available from: https:\/\/www.healthit.gov\/providers-professionals\/how-attain-meaningful-use. Archived at: http:\/\/www.webcitation.org\/6tST2tjYh.  How to attain meaningful use. {Internet}.; 2013. Available from: https:\/\/www.healthit.gov\/providers-professionals\/how-attain-meaningful-use. Archived at: http:\/\/www.webcitation.org\/6tST2tjYh."},{"key":"e_1_3_2_1_20_1","first-page":"100","volume":"200","author":"Irakleous I","journal-title":"Computer Security."},{"key":"e_1_3_2_1_21_1","unstructured":"International Organization Standardization (ISO). Ergonomic Requirements for Office Work with Visual Display Terminals (VDTs) - Part 11: Guidance on Usability. 1998 Jun 15 :22.  International Organization Standardization (ISO). Ergonomic Requirements for Office Work with Visual Display Terminals (VDTs) - Part 11: Guidance on Usability. 1998 Jun 15 :22."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314352"},{"key":"e_1_3_2_1_23_1","unstructured":"Kahate A. Cryptography and network security. Tata McGraw-Hill Education; 2013.  Kahate A. Cryptography and network security. Tata McGraw-Hill Education; 2013."},{"key":"e_1_3_2_1_24_1","first-page":"312","volume":"2012","author":"Krist AH","journal-title":"Annals of Family Medicine."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Kruse CS Bolton K Freriks G. The effect of patient portals on quality outcomes and its implications to meaningful use: a systematic review. Journal of medical Internet research. 2015;17(2):e44.  Kruse CS Bolton K Freriks G. The effect of patient portals on quality outcomes and its implications to meaningful use: a systematic review. Journal of medical Internet research. 2015;17(2):e44.","DOI":"10.2196\/jmir.3171"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/794197.795075"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"McCallister E Grance T Scarfone KA. Guide to protecting the confidentiality of personally identifiable information (PII). 2010. NIST. SP 800--122.  McCallister E Grance T Scarfone KA. Guide to protecting the confidentiality of personally identifiable information (PII). 2010. NIST. SP 800--122.","DOI":"10.6028\/NIST.SP.800-122"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Price M Bellwood P Kitson N Davies I Weber J Lau F. Conditions potentially sensitive to a personal health record (PHR) intervention a systematic review. BMC Medical Informatics and Decision Making. 2015;15(1):32.  Price M Bellwood P Kitson N Davies I Weber J Lau F. Conditions potentially sensitive to a personal health record (PHR) intervention a systematic review. BMC Medical Informatics and Decision Making. 2015;15(1):32.","DOI":"10.1186\/s12911-015-0159-1"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Ricciardi L Mostashari F Murphy J Daniel JG Siminerio EP. A national action plan to support consumer engagement via e-health. Health Affairs (Project Hope). 2013 Feb;32(2):376--384.  Ricciardi L Mostashari F Murphy J Daniel JG Siminerio EP. A national action plan to support consumer engagement via e-health. Health Affairs (Project Hope). 2013 Feb;32(2):376--384.","DOI":"10.1377\/hlthaff.2012.1216"},{"key":"e_1_3_2_1_30_1","unstructured":"Selecting good passwords. 2017. {Internet}. {updated N.d.; }. Available from: https:\/\/csguide.cs.princeton.edu\/accounts\/passwords. Archived at: http:\/\/www.webcitation.org\/6uerRKFmV. Princeton University.  Selecting good passwords. 2017. {Internet}. {updated N.d.; }. Available from: https:\/\/csguide.cs.princeton.edu\/accounts\/passwords. Archived at: http:\/\/www.webcitation.org\/6uerRKFmV. Princeton University."},{"key":"e_1_3_2_1_31_1","unstructured":"Selecting secure passwords. 2017. {Internet}. {updated N.d.; }. Available from: https:\/\/msdn.microsoft.com\/en-us\/library\/cc875839.aspx. Archived at: http:\/\/www.webcitation.org\/6uerbOzWn. Microsoft.  Selecting secure passwords. 2017. {Internet}. {updated N.d.; }. Available from: https:\/\/msdn.microsoft.com\/en-us\/library\/cc875839.aspx. Archived at: http:\/\/www.webcitation.org\/6uerbOzWn. Microsoft."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2013.10.001"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Toscos T Daley C Heral L Doshi R Chen Y Eckert GJ etal 2016. Impact of electronic personal health record use on engagement and intermediate health outcomes among cardiac patients: a quasi-experimental study. Journal of the American Medical InformaticsAssociation. Jan;23(1):119--28.  Toscos T Daley C Heral L Doshi R Chen Y Eckert GJ et al. 2016. Impact of electronic personal health record use on engagement and intermediate health outcomes among cardiac patients: a quasi-experimental study. Journal of the American Medical InformaticsAssociation. Jan;23(1):119--28.","DOI":"10.1093\/jamia\/ocv164"},{"key":"e_1_3_2_1_34_1","unstructured":"Undem T. 2010. Consumers and health information technology: a national survey. Lake Research Partners. Oakland CA:.  Undem T. 2010. Consumers and health information technology: a national survey. Lake Research Partners. Oakland CA:."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2009.10.001"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Zviran M Erlich Z. 2006. Identification and Authentication: Technology and Implementation Issues. Communications of the Association for Information Systems. 2006;17(4):90--105.  Zviran M Erlich Z. 2006. Identification and Authentication: Technology and Implementation Issues. Communications of the Association for Information Systems. 2006;17(4):90--105.","DOI":"10.17705\/1CAIS.01704"}],"event":{"name":"SIGMIS-CPR '18: 2018 Computers and People Research Conference","sponsor":["SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Buffalo-Niagara Falls NY USA","acronym":"SIGMIS-CPR '18"},"container-title":["Proceedings of the 2018 ACM SIGMIS Conference on Computers and People Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3209626.3209702","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3209626.3209702","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:32Z","timestamp":1750210772000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3209626.3209702"}},"subtitle":["A Comparison Study of Younger and Older Patients"],"short-title":[],"issued":{"date-parts":[[2018,6,18]]},"references-count":36,"alternative-id":["10.1145\/3209626.3209702","10.1145\/3209626"],"URL":"https:\/\/doi.org\/10.1145\/3209626.3209702","relation":{},"subject":[],"published":{"date-parts":[[2018,6,18]]},"assertion":[{"value":"2018-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}